Agents of obfuscation –
Newly surfaced document outlines FBI’s IDLE program — which seeks to make data theft harder.
Sean Gallagher -Dec (**************************************************************, **********************************************: (UTC UTC) **************************
Sharing happens a lot faster, Chu said, when there’s a “preexisting relationship with our partners, so we know exactly who we need to call and vice versa. ” And information flows faster when it goes both ways. “Just as we’re trying hard to get the private industry information as fast as possible, it’d be a lot more effective if we’re getting information from the private industry as well,” he said. Exchanging information about IP addresses, indicators of compromise, and other threat data allows the FBI to aggregate the data, “run that against our databases and all our resources, and come up with a much stronger case, so to speak, against our adversaries, “Chu noted,” along with trying to attribute or identify who did it will prevent further attacks from happening. ” Some information sharing takes the form of collaboration with industry information sharing and analysis centers (ISACs) and “Flash” and “Private Industry Notice “(PIN) alerts on cybercrime issues. And to build more direct relationships with companies’ security executives, the FBI also offers a “CISO Academy” for chief information security officers twice a year at the FBI Academy in Quantico, Virginia. Attendees are indoctrinated on the FBI’s investigation approaches, and they learn what kind of evidence needs to be preserved to help spur investigations forward.
But for some sectors of particular interest, the FBI is now trying to get a deeper level of collaboration going — especially with companies in the defense industry base (DIB) and other critical infrastructure industries. The FBI sees these areas as crucial industry-spanning networks, and it hopes to build a defense in-depth against cyber-espionage, intellectual property theft, and exposure of other data that could be used particularly by other nations in a way that could impact national security or the economy.That’s precisely where IDLE comes in. (************************************ Page: (1) ************************************** (2) ************************************** ()(Next) **************************************************************************************************************
GIPHY App Key not set. Please check settings